Learn about CVE-2021-43816, a high-severity vulnerability in containerd versions >= 1.5.0 and < 1.5.9, allowing unauthorized access to privileged host files. Upgrade to version 1.5.9 for protection.
A vulnerability in containerd allows unprivileged pods to access privileged host files on systems using SELinux, affecting versions >= 1.5.0 and < 1.5.9. Upgrading to version 1.5.9 is recommended.
Understanding CVE-2021-43816
containerd is an open-source container runtime that could allow for unauthorized access to privileged files on certain Linux systems.
What is CVE-2021-43816?
The vulnerability in containerd versions >= 1.5.0 and < 1.5.9 enables unprivileged pods to gain complete read/write access to privileged host files by using hostPath volume mounts with specific locations.
The Impact of CVE-2021-43816
The vulnerability has a CVSS base score of 8.0, indicating a high severity level. It can result in high confidentiality, integrity, and availability impacts, requiring high privileges and affecting the network's security.
Technical Details of CVE-2021-43816
This section covers specific technical aspects of the vulnerability.
Vulnerability Description
The issue arises on systems using SELinux, where unprivileged pods can bind mount hostPath volumes to access privileged files like
/etc/hosts
, /etc/hostname
, or /etc/resolv.conf
, potentially elevating permissions for unauthorized containers.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protect systems from the vulnerability and enhance security.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates